• Genel

    TIPS AGAINST SOCIAL ENGINEERING AND BEC

    As the world renews itself, attackers also develop themselves at the same speed and develop new methods to access personal information. In recent years, the methods hackers have made the most use of phishing attacks are social engineering and company e-mail attacks. Hackers who discover that the weakest point of organizations is individuals, target individuals…

  • Genel

    HOW TO PROTECT YOUR COMPANY AGAINST INCREASING CYBERATTACKS

    According to the newly announced reports, coronavirus epidemic-themed cyber-attacks and phishing attacks increased significantly during the quarantine period. While the majority of phishing attacks were COVID-19-themed attacks, almost all of these attacks were fraudulent. So how to protect your company and your employees against increasing cyberattacks? Report On How to Protect Your Company Against Increasing…

  • Genel

    FEW COMPANIES PROVIDE CYBERSECURITY TRAINING

    According to research, very few companies provide cybersecurity training. The research was conducted especially on private sector companies operating in the UK. The results revealed that most companies did not provide the necessary training to their employees during the remote working period. In the cybersecurity report, nearly 1200 people, including senior managers, general managers, directors,…

  • Genel

    SUBWAY PHISHING SPREADING MALWARE

    According to recent reports, a phishing attack was discovered that distributed malware to users’ computers. Hackers imitated the big food chain Subway by phishing. Hackers deceived users with an order confirmation email that appeared to be from Subway and distributed TrickBot malware to hundreds of people’s computers. Let’s take a look at the details about…

  • Genel

    HOW TO PROTECT YOURSELF FROM EMAIL PHISHING ATTACKS?

    One of the most common security problems today is email attacks. With the increase of phishing attacks, e-mail phishing attempts are causing hard times for both companies and individual users. The main purpose of hackers in these attacks is to capture information such as credit card information, usernames, or passwords that they normally cannot easily…

  • Genel

    PEOPLE STILL FALL VICTIM TO PHISHING

    Today, most companies have realized the importance of cybersecurity and started to provide regular cybersecurity training to employees. But despite this training, people still fall victim to phishing. People Still Fall Victim to Phishing: How So? Due to the coronavirus epidemic, many companies moved their businesses online. This required most employees to adapt to new…

  • Genel

    3 MOST FREQUENTLY USED PHISHING METHODS

    Phishing is one of the most common methods used by hackers. Phishing attacks have gradually developed and diversified with increasing attacks in recent years. Hackers began to use social engineering methods to deceive their victims. With these methods, victims’ confidential or personal information was stolen and then used for malicious purposes. It seems that hackers…

  • Genel

    WHY IS PHISHING AWARENESS IMPORTANT FOR COMPANIES?

    Companies consist of many departments, including many departments for business life, such as marketing, sales, finance, and human resources. So how do companies protect themselves when problems arise that may disrupt the functioning? Today, the first thing a company should do to protect itself is to raise awareness of cybersecurity within the company. This includes…

  • Genel

    EVERYTHING CONCERNING EMPLOYEES ABOUT PHISHING ATTACKS

    When phishing attacks first gained popularity years ago, people thought these attacks were only directed at users. Today, phishing has surpassed consumers and targeted companies, becoming one of the biggest threats to companies. When we look at the attacks that have taken place in recent years, we see that 90 percent of them were directed…

  • Genel

    THE MOST IMPORTANT EMAIL SECURITY TRENDS OF 2020

    Email services have been used by millions of people for years. These services develop over the years and undergo changes in line with these developments. This means that these systems are vulnerable while undergoing change. In addition to the change of email providers we currently use, over the years we have seen the birth of…

RSS Teknoloji Haberleri